Weiqiang Kong

According to our database1, Weiqiang Kong authored at least 47 papers between 2004 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
An Empirical Comparison Between Tutorials and Crowd Documentation of Application Programming Interface.
J. Comput. Sci. Technol., 2021

SDLV: Verification of Steering Angle Safety for Self-Driving Cars.
Formal Aspects Comput., 2021

2020
Compiler testing: a systematic literature analysis.
Frontiers Comput. Sci., 2020

A Multi-Strategy Combination Framework for Android Malware Detection Based on Various Features.
Proceedings of the International Symposium on Theoretical Aspects of Software Engineering, 2020

2019
ROSF: Leveraging Information Retrieval and Supervised Learning for Recommending Code Snippets.
IEEE Trans. Serv. Comput., 2019

Steering Interpolants Generation with Efficient Interpolation Abstraction Exploration.
Proceedings of the 2019 International Symposium on Theoretical Aspects of Software Engineering, 2019

Non-Deterministic Behavior Analysis for Embedded Software Based on Probabilistic Model Checking.
Proceedings of the 25th IEEE International Conference on Parallel and Distributed Systems, 2019

From Local to Global Semantic Clone Detection.
Proceedings of the 6th International Conference on Dependable Systems and Their Applications, 2019

Interpolation-Based Multi-core Bounded Model Checking of HSTM Designs.
Proceedings of the 6th International Conference on Dependable Systems and Their Applications, 2019

Multilevel Permission Extraction in Android Applications for Malware Detection.
Proceedings of the 2019 International Conference on Computer, 2019

2018
A Survey of Formal Techniques for Hardware/Software Co-verification.
Proceedings of the 7th International Congress on Advanced Applied Informatics, 2018

Analysis of Interrupt Behavior Based on Probabilistic Model Checking.
Proceedings of the 7th International Congress on Advanced Applied Informatics, 2018

Toward Sustainable Smart Mobility Information Infrastructure Platform - Current Status -.
Proceedings of the 7th International Congress on Advanced Applied Informatics, 2018

Method-Level Permission Analysis Based on Static Call Graph of Android Apps.
Proceedings of the 5th International Conference on Dependable Systems and Their Applications, 2018

Verification Model Translation Method toward Behavior Model for CAST.
Proceedings of the 5th International Conference on Dependable Systems and Their Applications, 2018

2017
A Branch History Directed Heuristic Search for Effective Binary Level Dynamic Symbolic Execution.
IEEE Access, 2017

Performance Evaluation for Interrupt-Driven Embedded Software Based on EDSPN.
IEEE Access, 2017

2016
Garakabu2: an SMT-based bounded model checker for HSTM designs in ZIPC.
J. Inf. Secur. Appl., 2016

Towards Sustainable Information Infrastructure Platform for Smart Mobility - Project Overview.
Proceedings of the 5th IIAI International Congress on Advanced Applied Informatics, 2016

2015
Facilitating Multicore Bounded Model Checking with Stateless Explicit-State Exploration.
Comput. J., 2015

Software for Wearable Devices: Challenges and Opportunities.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

2014
Translation rules of SysML state machine diagrams into CSP# toward formal model checking.
Int. J. Web Inf. Syst., 2014

A formal semantics of extended hierarchical state transition matrices using CSP#.
Formal Aspects Comput., 2014

2013
Towards Formal Description of Standards for Automotive Operating Systems.
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013

Formalization and Model Checking of SysML State Machine Diagrams by CSP#.
Proceedings of the Computational Science and Its Applications - ICCSA 2013, 2013

Harnessing SMT-Based Bounded Model Checking through Stateless Explicit-State Exploration.
Proceedings of the 20th Asia-Pacific Software Engineering Conference, 2013

2012
Formal semantics of extended hierarchical state transition matrix by CSP.
ACM SIGSOFT Softw. Eng. Notes, 2012

A dynamic channel assignment method based on location information of mobile terminals in indoor WLAN positioning systems.
Proceedings of the 2012 International Conference on Indoor Positioning and Indoor Navigation, 2012

On Accelerating SMT-based Bounded Model Checking of HSTM Designs.
Proceedings of the 19th Asia-Pacific Software Engineering Conference, 2012

Formal Verification of Communicating HSTM Designs.
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012

2011
An SMT-Based Approach to Bounded Model Checking of Designs in State Transition Matrix.
IEICE Trans. Inf. Syst., 2011

An SMT-Based Approach to Bounded Model Checking of Designs in Communicating State Transition Matrix.
Proceedings of the International Conference on Computational Science and Its Applications, 2011

Formal Verification of Software Designs in Hierarchical State Transition Matrix with SMT-based Bounded Model Checking.
Proceedings of the 18th Asia Pacific Software Engineering Conference, 2011

2010
Towards Reliable E-Government Systems with the OTS/CafeOBJ Method.
IEICE Trans. Inf. Syst., 2010

Model Checking of Software Design in State Transition Matrix.
Proceedings of the 2010 International Conference on Software Engineering Research & Practice, 2010

An SMT Approach to Bounded Model Checking of Design in State Transition Matrix.
Proceedings of the Prodeedings of the 2010 International Conference on Computational Science and Its Applications, 2010

2008
A Specification Translation from Behavioral Specifications to Rewrite Specifications.
IEICE Trans. Inf. Syst., 2008

Trace anonymity in the OTS/CafeOBJ method.
Proceedings of 8th IEEE International Conference on Computer and Information Technology, 2008

2007
Specification and Verification of Workflows with Rbac Mechanism and Sod Constraints.
Int. J. Softw. Eng. Knowl. Eng., 2007

Algebraic Approaches to Formal Analysis of the Mondex Electronic Purse System.
Proceedings of the Integrated Formal Methods, 6th International Conference, 2007

Formal support for e-government system design with transparency consideration.
Proceedings of the 1st International Conference on Theory and Practice of Electronic Governance, 2007

2006
Analysis of Positive Incentives for Protecting Secrets in Digital Rights Management.
Proceedings of the WEBIST 2006, 2006

Falsification of OTSs by Searches of Bounded Reachable State Spaces.
Proceedings of the Eighteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2006), 2006

Induction-Guided Falsification.
Proceedings of the Formal Methods and Software Engineering, 2006

2005
Formal Analysis of Workflow Systems with Security Considerations.
Proceedings of the 17th International Conference on Software Engineering and Knowledge Engineering (SEKE'2005), 2005

A Lightweight Integration of Theorem Proving and Model Checking for System Verification.
Proceedings of the 12th Asia-Pacific Software Engineering Conference (APSEC 2005), 2005

2004
Formal Analysis of an Anonymous Fair Exchange E-Commerce Protocol.
Proceedings of the 2004 International Conference on Computer and Information Technology (CIT 2004), 2004


  Loading...